Gains and Reflections on Adapting Android System for Xiaomi Mi Pad 2

Gains and Reflections on Adapting Android System for Xiaomi Mi Pad 2

I have a wish: to run a 64-bit Android 9.0 on the Xiaomi Mi Pad 2. The compatibility of 64-bit Android 9.0’s houdini is excellent. I once tried to implant houdini 9 into Android_x86-9.0 r2 and then installed it on the Xiaomi Mi Pad 2. I found that the apps ran very stably, and the … Read more

Learning QUIC Protocol Through Cronet Module

Learning QUIC Protocol Through Cronet Module

This article is an excellent piece from the KX Forum KX Forum Author ID: xwtwho Documenting the process of learning the QUIC protocol, the testing project is the testing app mentioned in the previous post: Some video app (V15.7) and web analysis record | bbs.pediy.com Learning record of some video app (V15.7-V18.4) | bbs.pediy.com Software … Read more

Adding a Syscall to Android 12 Kernel from Source Code

Adding a Syscall to Android 12 Kernel from Source Code

This article is an excellent piece from the Kanxue Forum. Kanxue Forum Author ID: xxxlion Adding a syscall to Android 12 involves quite a bit, and the information available online is often outdated (especially regarding bionic). I encountered many pitfalls along the way. I decided to write this article to document how to add a … Read more

LEDEST Military Digital Smart Electronic Sand Table

LEDEST Military Digital Smart Electronic Sand Table

1. Research and Development Background In recent years, in the military field, the application of virtual interaction technology between humans and combat environments, along with integrated systems, has greatly helped to address many practical issues in real combat training, such as high costs and environmental constraints. This has attracted the attention of military forces worldwide, … Read more

Understanding Lede vs Lead in Journalism

Understanding Lede vs Lead in Journalism

The previous article introduced the phrase “bury the lead” (Too long; didn’t read?). The issue lies with the three words! Some people specifically checked the TV show clips I provided and sent me screenshots: They also asked: The Chinese subtitles are incorrect, I understand. But what about the English subtitle that uses “lede”? Didn’t you … Read more

Research on PLC Attack Paths in Industrial Control Systems Security

Research on PLC Attack Paths in Industrial Control Systems Security

Abstract PLC (Programmable Logic Controller) is a fundamental control device in critical infrastructure, and its security is crucial for the stable operation of the entire control system. However, with the deepening integration of information technology and industrialization, as well as the advancement of Industry 4.0, the information security issues of industrial control systems have become … Read more

Analysis of Firmware Loading Address Security

Analysis of Firmware Loading Address Security

Author | Green Alliance Technology Ge Wu Laboratory Chen Jie Introduction: In firmware analysis, it is often necessary to locate the firmware’s loading address, especially the memory address where Vxworks or Linux kernel is loaded into memory, which facilitates reverse engineering tools like IDA PRO for correct disassembly and string references. In the following sections, … Read more